Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Geodesic
Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Prikladnaâ diskretnaâ matematika
Année 2011
Précédent
Suivant
Sommaire du
Fascicule no. 1
Generating functions for sequences of disordered covers numbers
R. M. Ganopolsky
p. 5-13
Conditions for maximality of subclones
N. G. Parvatov
p. 14-25
On the number of perfectly balanced Boolean functions with barrier of length~
$3$
S. V. Smyshlyaev
p. 26-33
Upper bounds on nonlinearity of correlation immune Boolean functions
A. V. Khalyavin
p. 34-69
Some proxy signature protocols
E. A. Tolyupa
p. 70-77
Transformation rules for states in base role DP-model of access control and information flows in operating systems
P. N. Devyanin
p. 78-95
Technology for translating combinatorial problems into Boolean equations
I. V. Otpuschennikov
;
A. A. Semenov
p. 96-115
Parallel implementation of asynchronous cellular automata for modeling CO oxidation over palladium surface
V. P. Markova
;
A. E. Sharifulina
p. 116-126
Sommaire du
Fascicule no. 2
On some measures of nonlinearity for Boolean functions
E. K. Alekseev
p. 5-16
Formation of a~dictionary of terms in the theory of modeling the secure access and information flows control in computer systems
P. N. Devyanin
p. 17-39
FPT-algorithms and their classification on the basis of elasticity
V. V. Bykova
p. 40-48
A note on polynomial approximation of synchronizing optimal coloring
M. V. Berlinkov
p. 49-72
Skeleton automata
V. N. Salii
p. 73-76
Minimal edge extensions of oriented and directed stars
M. B. Abrosimov
p. 77-89
Attractors of dynamical systems associated with cycles
A. V. Vlasova
p. 90-95
On congruences of paths
E. O. Karmanova
p. 96-100
The estimates of exponents for primitive graphs
V. M. Fomichev
p. 101-112
Cumulative synthesis: a~cellular-automata model of physical-chemical processes on the stage of powder revetment collapsing
O. L. Bandman
;
S. A. Kinelovsky
p. 113-124
Sommaire du
Fascicule no. 3
Fast algorithm for statistical estimation of the maximal imbalance of bilinear approximations of Boolean mappings
A. N. Alekseychuk
;
A. S. Shevtsov
p. 5-11
On the complexity of proving that a~Boolean function is not a~binary read-once
A. A. Voronenko
p. 12-16
Method for constructing elliptic curves using complex multiplication and its optimizations
E. A. Grechnikov
p. 17-54
Implementation of security policies in programming information processing systems
D. A. Stefantsov
p. 55-64
Computational aspects of treewidth for graph
V. V. Bykova
p. 65-79
Computational complexity of the problem of approximation by graphs with connected components of bounded size
V. P. Il'ev
;
A. A. Navrocka
p. 80-84
Interval on one party regular edge 5-coloring of bipatite graph
A. M. Magomedov
;
T. A. Magomedov
p. 85-91
Structural and communicative properties of circulant networks
E. A. Monakhova
p. 92-115
On implementation of the meet-in-the-middle attack by means of parallel computations
V. M. Fomichev
p. 116-121
Analytical incomplete multiplicative pairwise comparisons method
I. S. Kiselev
p. 122-128
Sommaire du
Fascicule no. 4
Construction of maximal clones in the set of point functions on interval semilattice
N. G. Parvatov
p. 5-10
Locally invertible Boolean functions
S. V. Smyshlyaev
p. 11-21
Homomorphic stability of pairs of small order groups
I. A. Shilin
;
V. V. Kityukov
p. 22-27
Almost perfect ciphers and authentication codes
A. U. Zubov
p. 28-33
On minimal vertex 1-extensions of special type graph union
M. B. Abrosimov
p. 34-41
Multiplicities of sums in the explicit formulae for counting fixed length cycles in undirected graphs
A. N. Voropaev
p. 42-55
Some prefractal graph's connectivity characteristics estimations
A. A. Kochkarov
;
L. I. Sennikova
p. 56-61
State assignment in a~discrete automaton targeting an implementing low power circuit
Yu. V. Pottosin
p. 62-71
Regular estimates for the complexity of polynomial multiplication and truncated Fourier transform
I. S. Sergeev
p. 72-88
Populations of interacting automata
Yu. V. Berezovsky
;
V. A. Vorob'ev
p. 89-104
SIBECRYPT'11 review
G. P. Agibalov
p. 105-120
Sommaire du
Fascicule no. 13
An algorithm of computing
$D$
-gap numbers and
$D$
-Weierstrass points
E. S. Alekseenko
p. 6-8
Coding of finite integer Lattice by means of mappings with a~bounded distortion
A. A. Evdokimov
p. 8-9
The number of bent functions on the minimal distance from a~quadratic bent function
N. A. Kolomeeс
p. 9-11
Statistical independence of the Boolean function superposition
O. L. Kolcheva
;
I. A. Pankratova
p. 11-12
Classification of ANF graphs for quadratic bent functions in~6 variables
E. P. Korsakova
p. 13-14
Weakly central clones and completeness problem for them
N. G. Parvatov
p. 14-16
Description of the class of permutations, represented as a~product of two permutations with fixed number of mobile points
A. B. Pichkur
p. 16-17
On approximation of permutations by imprimitive groups
B. A. Pogorelov
;
M. A. Pudovkina
p. 17-18
On perfect 2-colorings of the
$q$
-ary hypercube
V. N. Potapov
p. 18-20
Algebras of languages associated with labelled graphs
E. A. Pryanichnikova
p. 20-21
Hypotheses for the number of bent functions
N. N. Tokareva
p. 21-23
Polynomials over primary residue rings with a~small unique distance
A. V. Abornev
;
D. N. Bylkov
p. 24-25
Mapping enlargements preserving identification property
L. N. Andreeva
p. 26-27
Provable secure dynamic group signature scheme
A. V. Artamonov
;
P. N. Vasilev
;
E. B Makhovenko
p. 27-29
Algebraic cryptanalysis of one-round S-AES
R. I. Voronin
p. 29-31
Discrete logarithm diophantiness
S. Y. Erofeev
p. 31-32
Constructing of one-way functions based on undecidability of the endomorphism problem in groups
S. Y. Erofeev
;
V. A. Romankov
p. 32-33
FPGA implementation of Finite Automata Public Key Cryptosystem
D. S. Kovalev
;
V. N. Trenkaev
p. 33-34
Analysis of the GOST 28147-89 modes of operation that provide confidentiality
I. A. Kukalo
p. 34-36
On the choice of slid pairs for the correlation cryptanalysis of KeeLoq
O. N. Lebedeva
p. 36-38
On impossible truncated differentials of XSL ciphers
M. A. Pudovkina
p. 38-39
Reliability analysis of graphical CAPTCHA-systems by the example of KCAPTCHA
M. B. Abrosimov
;
A. A. Matorin
p. 40-41
About the role DP-model for access and information flows control in operating systems of Linux family
P. N. Devyanin
p. 42-43
Role-based security model of SELinux computer system
M. A. Kachanov
p. 44-46
The development feutures of network access control DP-model
D. N. Kolegov
p. 46-48
The security model for cross-platform web services of municipal procurement support
D. D. Kononov
;
S. V. Isaev
p. 48-50
Development of comprehensive taught system that protects information resources from phishing attacks
A. V. Miloshenko
;
T. M. Solovjev
;
R. I. Chernyak
;
M. V. Shumskaya
p. 50-55
Approaches to development of discretionary DP-model of the modern secure operating systems
V. G. Proskurin
p. 55-57
FPT-algorithms and their classification on the base of elasticity
V. V. Bykova
p. 58-60
About phrase-structure grammar property
K. V. Safonov
;
D. A. Kalugin-Balashov
p. 60-61
A denotational semantics for the AspectTalk programming language
D. A. Stephantsov
;
A. E. Kryukova
p. 61-62
Design and implementation of the ORM library in C++
D. A. Stephantsov
;
N. O. Tkachenko
;
D. V. Chernov
;
R. V. Shmakova
p. 62-65
Solving of cryptanalysis problems in grid systems (by the example of BOINC)
O. S. Zaikin
p. 66-67
``Boolean Functions'' is a~system for the work with boolean functions
N. A. Kolomeec
;
A. V. Pavlov
p. 67-68
Application of SAT-approach for solving combinatorial problems
A. A. Semenov
;
I. V. Otpuschennikov
;
S. E. Kochemazov
p. 68-69
On parallel computations in implementation of the meat-in-the-middle attack
V. M. Fomichev
p. 69-73
C-model of a~predator--prey growth in the ecological niche
Yu. V. Berezovsky
;
V. A. Vorob'ev
p. 74-76
On skeleton automata
V. N. Salii
p. 76-78
Fault attack on reconfigurable FSM-based cipher of Zakrevskij
V. N. Trenkaev
p. 78-79
Minimal extensions for cycles with vertices of two types
M. B. Abrosimov
;
P. P. Bondarenko
p. 80-81
On the uniqueness of exact vertex extensions
M. B. Abrosimov
;
A. A. Dolgov
p. 81-82
On minimal edge 1-extensions of two special form trees
M. B. Abrosimov
;
D. D. Komarov
p. 83-84
On properties of minimal extensions of orgraphs
M. B. Abrosimov
;
O. V. Modenova
p. 84-85
Computational aspects of treewidth for graph
V. V. Bykova
p. 85-87
On attractors of dynamical systems associated with cycles
A. V. Vlasova
p. 88-89
On mobile agent self-location using topological properties of environment
I. S. Grunsky
;
S. V. Sapunov
p. 90-91
On congruences of paths
E. O. Karmanova
p. 91-92
On some prefractal graphs properties
A. A. Kochkarov
;
L. I. Sennikova
;
N. N. Bolurov
p. 93-94
Compact graphs and the deterministic algorithm for their synthesis
V. A. Melent'ev
p. 94-96
Restrictions on girths in compact graphs
V. A. Melent'ev
p. 96-98
The improvement of exponent's estimates for primitive graphs
V. M. Fomichev
p. 98-100